Sciweavers

5722 search results - page 83 / 1145
» Security Function Interactions
Sort
View
IACR
2011
90views more  IACR 2011»
12 years 8 months ago
On the Security of the Winternitz One-Time Signature Scheme
Abstract. We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random ...
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andre...
ICOIN
2001
Springer
14 years 1 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
CSREASAM
2006
13 years 10 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson
BMCBI
2005
149views more  BMCBI 2005»
13 years 8 months ago
The PD-(D/E)XK superfamily revisited: identification of new members among proteins involved in DNA metabolism and functional pre
Background: The PD-(D/E)XK nuclease superfamily, initially identified in type II restriction endonucleases and later in many enzymes involved in DNA recombination and repair, is o...
Jan Kosinski, Marcin Feder, Janusz M. Bujnicki
ICC
2007
IEEE
107views Communications» more  ICC 2007»
14 years 3 months ago
The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...